Ranking of closeness centrality for large-scale social networks
Closeness centrality is an important concept in social network analysis. In a graph
representing a social network, closeness centrality measures how close a vertex is to all …
representing a social network, closeness centrality measures how close a vertex is to all …
An annotated bibliography on guaranteed graph searching
FV Fomin, DM Thilikos - Theoretical computer science, 2008 - Elsevier
Graph searching encompasses a wide variety of combinatorial problems related to the
problem of capturing a fugitive residing in a graph using the minimum number of searchers …
problem of capturing a fugitive residing in a graph using the minimum number of searchers …
[HTML][HTML] Connected graph searching
In the graph searching game the opponents are a set of searchers and a fugitive in a graph.
The searchers try to capture the fugitive by applying some sequence of moves that include …
The searchers try to capture the fugitive by applying some sequence of moves that include …
Decontaminating chordal rings and tori using mobile agents
P Flocchini, MJ Huang, FL Luccio - International Journal of …, 2007 - World Scientific
In this paper we consider a network where an intruder is moving" contaminating" the nodes it
passes by, and we focus on the problem of decontaminating such a network by a team of …
passes by, and we focus on the problem of decontaminating such a network by a team of …
Suade: Topology-based searches for software investigation
FW Warr, MP Robillard - 29th International Conference on …, 2007 - ieeexplore.ieee.org
The investigation of a software system prior to a modification task often constitutes an
important fraction of the overall effort associated with the task. We present Suade, an Eclipse …
important fraction of the overall effort associated with the task. We present Suade, an Eclipse …
[PDF][PDF] Future trends in database systems
M Stonebraker - IEEE Transactions on Knowledge and Data …, 1989 - db.cs.berkeley.edu
This paper discusses the likely evolution of commercial data managers over the next several
years. Topics to be covered include: Why SQL has become an intergalactic standard. Who …
years. Topics to be covered include: Why SQL has become an intergalactic standard. Who …
Graph searching with advice
N Nisse, D Soguet - Theoretical Computer Science, 2009 - Elsevier
Fraigniaud et al.[L. Blin, P. Fraigniaud, N. Nisse, S. Vial, Distributing chasing of network
intruders, in: 13th Colloquium on Structural Information and Communication Complexity …
intruders, in: 13th Colloquium on Structural Information and Communication Complexity …
[PS][PS] Size Optimal Strategies for Capturing an Intruder in Mesh Networks Ѓ
P Flocchini, FL Luccio, LX Song - 2005 - site.uottawa.ca
In this paper we consider the problem of capturing an intruder in a networked environment.
The intruder is defined as a mobile entity that moves inside the network and escapes from a …
The intruder is defined as a mobile entity that moves inside the network and escapes from a …
Distributed chasing of network intruders
Graph searching is one of the most popular tools for analyzing the chase for a powerful and
hostile software agent (called the “intruder”), by a set of software agents (called the …
hostile software agent (called the “intruder”), by a set of software agents (called the …
Connected searching of weighted trees
D Dereniowski - Theoretical Computer Science, 2011 - Elsevier
In this paper we consider the problem of connected edge searching of weighted trees.
Barrière et al. claim in [L. Barrière, P. Flocchini, P. Fraigniaud, N. Santoro, Capture of an …
Barrière et al. claim in [L. Barrière, P. Flocchini, P. Fraigniaud, N. Santoro, Capture of an …